Problems of Reducing the Exhaustive Search


Book Description

This collection contains translations of papers on propositional satisfiability and related logical problems which appeared in roblemy Sokrashcheniya Perebora, published in Russian in 1987 by the Scientific Council "Cybernetics" of the USSR Academy of Sciences. The problems form the nucleus of this intensively developing area. This translation is dedicated to the memory of two remarkable Russian mathematicians, Sergei Maslov and his wife Nina Maslova. Maslov is known as the originator of the universe method in automated deduction, which was discovered at the same time as the resolution method of J. A. Robison and has approximately the same range of applications. In 1981, Maslov proposed an iterative algorithm for propositional satisfiability based on some general ideas of search described in detail in his posthumously published book, Theory of Deductive Systems and Its Applications (1986; English 1987). This collection contains translations of papers on propositional satisfiability and related logical problems. The papers related to Maslov's iterative method of search reduction play a significant role.




Perception of Form and Forms of Perception


Book Description

First Published in 1987. Information processing has come to be regarded as one of the central issues in modern psychology. In recent years it has acquired an especially keen interest due to growing amounts of information. This book continues the authors’ research and constructs a conceptual model of peculiarities (separate aspects) of visual information processing based on views similar to those by Arbib and Ivanov.




Computerworld


Book Description

For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-monthly publication, focused conference series and custom research form the hub of the world's largest global IT media network.




Advances in Optimization and Applications


Book Description

This book constitutes the refereed proceedings of the 11th International Conference on Optimization and Applications, OPTIMA 2020, held in September – October 2020. Due to the COVID-19 pandemic the conference was held online. The 18 revised full papers presented were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on ​global optimization; combinatorial and discrete optimization; optimal control; optimization in economy, finance and social sciences; applications.




Readings in Artificial Intelligence


Book Description

Readings in Artificial Intelligence focuses on the principles, methodologies, advancements, and approaches involved in artificial intelligence. The selection first elaborates on representations of problems of reasoning about actions, a problem similarity approach to devising heuristics, and optimal search strategies for speech understanding control. Discussions focus on comparison with existing speech understanding systems, empirical comparisons of the different strategies, analysis of distance function approximation, problem similarity, problems of reasoning about action, search for solution in the reduction system, and relationship between the initial search space and the higher level search space. The book then examines consistency in networks of relations, non-resolution theorem proving, using rewriting rules for connection graphs to prove theorems, and closed world data bases. The manuscript tackles a truth maintenance system, elements of a plan-based theory of speech acts, and reasoning about knowledge and action. Topics include problems in reasoning about knowledge, integration knowledge and action, models of plans, compositional adequacy, truth maintenance mechanisms, dialectical arguments, and assumptions and the problem of control. The selection is a valuable reference for researchers wanting to explore the field of artificial intelligence.




Advanced Topics in Database Research, Volume 1


Book Description

Advanced Topics in Database Research features the latest, cutting-edge research findings dealing with all aspects of database management, systems analysis and design and software engineering. This book provides information that is instrumental in the improvement and development of theory and practice related to information technology and management of information resources.




Design and Optimization of Thermal Systems, Third Edition


Book Description

Design and Optimization of Thermal Systems, Third Edition: with MATLAB® Applications provides systematic and efficient approaches to the design of thermal systems, which are of interest in a wide range of applications. It presents basic concepts and procedures for conceptual design, problem formulation, modeling, simulation, design evaluation, achieving feasible design, and optimization. Emphasizing modeling and simulation, with experimentation for physical insight and model validation, the third edition covers the areas of material selection, manufacturability, economic aspects, sensitivity, genetic and gradient search methods, knowledge-based design methodology, uncertainty, and other aspects that arise in practical situations. This edition features many new and revised examples and problems from diverse application areas and more extensive coverage of analysis and simulation with MATLAB®.




Bounded Rationality in Decision Making Under Uncertainty: Towards Optimal Granularity


Book Description

This book addresses an intriguing question: are our decisions rational? It explains seemingly irrational human decision-making behavior by taking into account our limited ability to process information. It also shows with several examples that optimization under granularity restriction leads to observed human decision-making. Drawing on the Nobel-prize-winning studies by Kahneman and Tversky, researchers have found many examples of seemingly irrational decisions: e.g., we overestimate the probability of rare events. Our explanation is that since human abilities to process information are limited, we operate not with the exact values of relevant quantities, but with “granules” that contain these values. We show that optimization under such granularity indeed leads to observed human behavior. In particular, for the first time, we explain the mysterious empirical dependence of betting odds on actual probabilities. This book can be recommended to all students interested in human decision-making, to researchers whose work involves human decisions, and to practitioners who design and employ systems involving human decision-making —so that they can better utilize our ability to make decisions under uncertainty.




Progress in Cryptology - AFRICACRYPT 2010


Book Description

This book constitutes the proceedings of the Third International Conference on Cryptology in Africa, AFRICACRYPT 2010, held in Stellenbosch, South Africa, on May 3-6, 2010. The 25 papers presented together with three invited talks were carefully reviewed and selected from 82 submissions. The topics covered are signatures, attacks, protocols, networks, elliptic curves, side-channel attacks and fault attacks, public-key encryption, keys and PUFs, and ciphers and hash functions.




Information Security


Book Description

Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes: Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systems Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM Software: flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic "orange book" view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive solutions manual is available to assist in course development. Minimizing theory while providing clear, accessible content, Information Security remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields.